| FIRST/FIRST logo.jpg |
12 KB |
| FIRST/FIRST thank you.txt |
1 KB |
| FIRST/HEADER.md |
503 B |
| FIRST/FIRST 2022 - AP Regions/Attack Hunting with Threat Intelligence.mp4 |
29.5 MB |
| FIRST/FIRST 2022 - AP Regions/Introduction of Cybersecurity AI Dataset.mp4 |
21.6 MB |
| FIRST/FIRST 2022 - AP Regions/Introduction of SIM3 Training in Japan.mp4 |
22.4 MB |
| FIRST/FIRST 2022 - AP Regions/Resilient Secure Software Development Through Insights Learned from Adversarial Attack Campaigns.mp4 |
28.2 MB |
| FIRST/FIRST 2022 - AP Regions/Supply Chain Security for IoT Devices.mp4 |
17.7 MB |
| FIRST/FIRST 2022 - AP Regions/FIRST 2022 - AP Regions captions/Attack Hunting with Threat Intelligence.eng.srt |
42 KB |
| FIRST/FIRST 2022 - AP Regions/FIRST 2022 - AP Regions captions/Introduction of Cybersecurity AI Dataset.eng.srt |
39 KB |
| FIRST/FIRST 2022 - AP Regions/FIRST 2022 - AP Regions captions/Introduction of SIM3 Training in Japan.eng.srt |
35 KB |
| FIRST/FIRST 2022 - AP Regions/FIRST 2022 - AP Regions captions/Resilient Secure Software Development Through Insights Learned from Adversarial Attack Campaigns.eng.srt |
56 KB |
| FIRST/FIRST 2022 - AP Regions/FIRST 2022 - AP Regions captions/Supply Chain Security for IoT Devices.eng.srt |
55 KB |
| FIRST/FIRST CTI 2022/Community Management and Tool Orchestration the Open source Way via Cerebrate.mp4 |
26.3 MB |
| FIRST/FIRST CTI 2022/CTI Bake-Off A Recipe for Measuring, Integrating, and Prioritizing a CTI Program.mp4 |
29.9 MB |
| FIRST/FIRST CTI 2022/Cyber Threat Intelligence Analysts and You.mp4 |
29.3 MB |
| FIRST/FIRST CTI 2022/Diamonds are a Forensicator's Best Friend - Intelligence Support for DFIR.mp4 |
33 MB |
| FIRST/FIRST CTI 2022/Enhancing CTI Processes with Code Search Technology.mp4 |
31.4 MB |
| FIRST/FIRST CTI 2022/How to Create Effective Structured Intelligence Extensions for TIPs.mp4 |
25.7 MB |
| FIRST/FIRST CTI 2022/Lets Make Needles Glow in Timesketch.mp4 |
25.7 MB |
| FIRST/FIRST CTI 2022/ORKL Building an Archive for Threat Intelligence History.mp4 |
21.9 MB |
| FIRST/FIRST CTI 2022/Targeted Web Skimming on E-Commerce Sites.mp4 |
21.4 MB |
| FIRST/FIRST CTI 2022/Ten Years of Cyber Threat Intelligence Retrospectives.mp4 |
31 MB |
| FIRST/FIRST CTI 2022/The Joy of Threat Landscaping.mp4 |
30.9 MB |
| FIRST/FIRST CTI 2022/Why Your Security Analysts Are Leaving and What You Can Do to Retain Them.mp4 |
28.7 MB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Community Management and Tool Orchestration the Open source Way via Cerebrate.eng.srt |
55 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/CTI Bake-Off A Recipe for Measuring, Integrating, and Prioritizing a CTI Program.eng.srt |
54 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Cyber Threat Intelligence Analysts and You.eng.srt |
55 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Diamonds are a Forensicator's Best Friend - Intelligence Support for DFIR.eng.srt |
52 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Enhancing CTI Processes with Code Search Technology.eng.srt |
47 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/How to Create Effective Structured Intelligence Extensions for TIPs.eng.srt |
54 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Lets Make Needles Glow in Timesketch.eng.srt |
51 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/ORKL Building an Archive for Threat Intelligence History.eng.srt |
38 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Targeted Web Skimming on E-Commerce Sites.eng.srt |
42 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Ten Years of Cyber Threat Intelligence Retrospectives.eng.srt |
57 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/The Joy of Threat Landscaping.eng.srt |
64 KB |
| FIRST/FIRST CTI 2022/FIRST CTI 2022 captions/Why Your Security Analysts Are Leaving and What You Can Do to Retain Them.eng.srt |
74 KB |
| FIRST/FIRST CTI 2023/A Collective CTI Doctrine.mp4 |
36.8 MB |
| FIRST/FIRST CTI 2023/Automating the Junior Analyst Cyber Security Report Generation with Classic AI.mp4 |
27.7 MB |
| FIRST/FIRST CTI 2023/Foresight Analysis The Magic Eight Ball of Intelligence Analysis.mp4 |
40.9 MB |
| FIRST/FIRST CTI 2023/Helping Organizations Anticipate and Approach Emerging Technology Threats.mp4 |
55.7 MB |
| FIRST/FIRST CTI 2023/How Much Alert Fatigue Actually is Threat Intel Fatigue.mp4 |
27.6 MB |
| FIRST/FIRST CTI 2023/How to Improve Your Threat Intelligence Process with AIL Project.mp4 |
37.1 MB |
| FIRST/FIRST CTI 2023/If You Want to Build Good Intelligence Requirements, You Do Not Start with Intelligence Requirements.mp4 |
40.7 MB |
| FIRST/FIRST CTI 2023/MISP 3 - Teaching an Old Dog New Tricks.mp4 |
36.9 MB |
| FIRST/FIRST CTI 2023/Solving CISO Headaches How to Align CTI and Risk Management.mp4 |
36.7 MB |
| FIRST/FIRST CTI 2023/Spin Your CTI Process Round.mp4 |
33 MB |
| FIRST/FIRST CTI 2023/The Blueprint for Enduring Actionable CTI.mp4 |
38.6 MB |
| FIRST/FIRST CTI 2023/ThreatIntelGPT STIX from Chaos.mp4 |
40 MB |
| FIRST/FIRST CTI 2023/VERIS Mappings to ATT&CK - Bridging Risk-based and Ops-focused Incident Classification.mp4 |
35.4 MB |
| FIRST/FIRST CTI 2023/What is a Threat Actor Tracking Sandworm's Transformation.mp4 |
42.8 MB |
| FIRST/FIRST CTI 2023/Why AI Will Not Take Our CTI Analyst Jobs (But We Should Befriend the Machines, Anyway).mp4 |
44.4 MB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/A Collective CTI Doctrine.eng.srt |
46 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Automating the Junior Analyst Cyber Security Report Generation with Classic AI.eng.srt |
34 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Foresight Analysis The Magic Eight Ball of Intelligence Analysis.eng.srt |
51 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Helping Organizations Anticipate and Approach Emerging Technology Threats.eng.srt |
60 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/How Much Alert Fatigue Actually is Threat Intel Fatigue.eng.srt |
30 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/How to Improve Your Threat Intelligence Process with AIL Project.eng.srt |
44 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/If You Want to Build Good Intelligence Requirements, You Do Not Start with Intelligence Requirements.eng.srt |
61 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/MISP 3 - Teaching an Old Dog New Tricks.eng.srt |
58 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Solving CISO Headaches How to Align CTI and Risk Management.eng.srt |
59 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Spin Your CTI Process Round.eng.srt |
45 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/The Blueprint for Enduring Actionable CTI.eng.srt |
51 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/ThreatIntelGPT STIX from Chaos.eng.srt |
49 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/VERIS Mappings to ATT&CK - Bridging Risk-based and Ops-focused Incident Classification.eng.srt |
44 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/What is a Threat Actor Tracking Sandworm's Transformation.eng.srt |
60 KB |
| FIRST/FIRST CTI 2023/FIRST CTI 2023 captions/Why AI Will Not Take Our CTI Analyst Jobs (But We Should Befriend the Machines, Anyway).eng.srt |
62 KB |
| FIRST/FIRST CTI 2024/Advanced Cyber Threat Intelligence Chapter - How to Read the Mind of your Attackers.mp4 |
23.1 MB |
| FIRST/FIRST CTI 2024/Automating Cyber Threat Intelligence A Practical Approach to Managing Emerging Vulnerabilities.mp4 |
21.9 MB |
| FIRST/FIRST CTI 2024/Blueprint for Maturity Crafting a Tailored Cyber Threat Intelligence Maturity Model.mp4 |
29.8 MB |
| FIRST/FIRST CTI 2024/Decoding Cyber Threats A Practical Guide to Using Attack Trees.mp4 |
30.6 MB |
| FIRST/FIRST CTI 2024/Enhancing Malware Code Similarity Detection through Vectorsearch and TLSH.mp4 |
29.6 MB |
| FIRST/FIRST CTI 2024/How to Measure Quality os LLMs.mp4 |
30.9 MB |
| FIRST/FIRST CTI 2024/How to Start Using Priority Intelligence Requirements (PIRs) on a Budget.mp4 |
33.4 MB |
| FIRST/FIRST CTI 2024/If CSIRTs are Knights, CTI Teams are Queens.mp4 |
21 MB |
| FIRST/FIRST CTI 2024/Invisible Strings - Contemporary Challenges And Techniques Of Infrastructure Tracking.mp4 |
31.6 MB |
| FIRST/FIRST CTI 2024/Processing Threat Reports at Scale Using AI and ML Expectations and Reality.mp4 |
35.8 MB |
| FIRST/FIRST CTI 2024/Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS).mp4 |
23.3 MB |
| FIRST/FIRST CTI 2024/Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository Extend STIX 2.1 FTW.mp4 |
23.8 MB |
| FIRST/FIRST CTI 2024/Source Pollution Attack - A Hidden Threat in Cybersecurity.mp4 |
26.8 MB |
| FIRST/FIRST CTI 2024/The Disclosure Dilemma and Ensuring Defense.mp4 |
28.7 MB |
| FIRST/FIRST CTI 2024/Tracking Threat Actors Using Images A Hunting & Analysis Approach.mp4 |
33.7 MB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Advanced Cyber Threat Intelligence Chapter - How to Read the Mind of your Attackers.eng.srt |
34 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Automating Cyber Threat Intelligence A Practical Approach to Managing Emerging Vulnerabilities.eng.srt |
44 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Blueprint for Maturity Crafting a Tailored Cyber Threat Intelligence Maturity Model.eng.srt |
45 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Decoding Cyber Threats A Practical Guide to Using Attack Trees.eng.srt |
62 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Enhancing Malware Code Similarity Detection through Vectorsearch and TLSH.eng.srt |
43 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/How to Measure Quality os LLMs.eng.srt |
50 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/How to Start Using Priority Intelligence Requirements (PIRs) on a Budget.eng.srt |
44 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/If CSIRTs are Knights, CTI Teams are Queens.eng.srt |
49 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Invisible Strings - Contemporary Challenges And Techniques Of Infrastructure Tracking.eng.srt |
49 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Processing Threat Reports at Scale Using AI and ML Expectations and Reality.eng.srt |
49 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS).eng.srt |
50 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository Extend STIX 2.1 FTW.eng.srt |
32 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Source Pollution Attack - A Hidden Threat in Cybersecurity.eng.srt |
42 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/The Disclosure Dilemma and Ensuring Defense.eng.srt |
52 KB |
| FIRST/FIRST CTI 2024/FIRST CTI 2024 captions/Tracking Threat Actors Using Images A Hunting & Analysis Approach.eng.srt |
47 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/A Legislation Guide for Keeping pace with Cybersecurity Paradigm Shift toward Vulnerability.mp4 |
24.7 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/A Roadmap for Your OSS Security Lifecyle Journey to Protect Customers.mp4 |
43.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Adventures in Vulnerability Coordination.mp4 |
50.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....mp4 |
23.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Building a Better Database How GitHub Structures Their Advisory Database to Drive Developer.mp4 |
20.7 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/China's New Vuln System.mp4 |
28 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CISA’s Known Exploited Vulnerabilities (KEV) Catalog.mp4 |
35.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CNA Challenges From a National CERT Perspective.mp4 |
21.8 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CNA Feedback Session to the CVE Program.mp4 |
31.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Conference Closing Remarks.mp4 |
17.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Crossing the Streams - How Downstream Can Understand Upstream Vulns.mp4 |
42.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CSAF VEX Improved Security Data.mp4 |
22.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CVE Is The Worst Vulnerability Framework (Except For All The Others).mp4 |
41.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/CVSS SIG Past, Present & Future - CVSS v4.0 Beyond the Numbers.mp4 |
52.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Daily Updates & Announcements.mp4 |
4.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Day 1 Wrap Up & Lessons Learned.mp4 |
48.5 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Day 2 Wrap Up & Lessons Learned.mp4 |
62.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Democratizing Exploitability Data with OpenVEX.mp4 |
31.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Effective Vulnerability Management for Over 400 Projects at the Eclipse Foundation.mp4 |
25 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Elevating Security Standards Intel's Integration of Common Security Advisory Framework into.mp4 |
31.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/EPSS Challenges and Opportunities Going Forward - EPSS AMA.mp4 |
59.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Finding, Managing, Preventing Vulnerabilities An Automotive Perspective.mp4 |
55.1 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Firmware Supply Chain Security BoF.mp4 |
59.1 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/From SBOM to VEX - Discovering What's in the Box and How Badly it Can Hurt You.mp4 |
30.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Information Sharing to Mitigate Emerging Vulnerabilities.mp4 |
27.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Nestlé Unified Vulnerability Management Approach.mp4 |
36.4 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Panel Discussion - The Risks of Requiring Premature Vulnerability Disclosures.mp4 |
53.6 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Panel Discussion Don’t be Vexed by VEX - VEXperts Panel.mp4 |
37.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Panel Discussion Enabling Accurate, Decentralized Root Cause Mapping at Scale.mp4 |
42.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Panel Discussion It is a Tale as Old as Time. a CNA, the NVD, and a CVE Consumer Walk Into a.mp4 |
40.7 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Panel Discussion This One Time at CVD Camp.mp4 |
41.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Pushing Coordinated Vulnerability Disclosure forward in Asia Pacific.mp4 |
20.6 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Reducing Ratio of Reserved But Public CVEs.mp4 |
27.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Revising the CVE CNA Operational Rules AMA.mp4 |
36.9 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/SBOMs - The Missing Link.mp4 |
38.6 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Seeing the Vulnerable Forest Through the Exploited Trees.mp4 |
42.5 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Supply Chain Security The Office of the National Cyber Director Perspective.mp4 |
71.8 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/The CWE Program Current State and Road Ahead.mp4 |
47.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/The Trials and Tribulations of Bulk Converting CVEs to OSV.mp4 |
26.7 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Understanding Red Hat's SBOM - The Future of Software Transparency.mp4 |
35.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Vulnerability Coordination in the EU.mp4 |
43.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Welcome Remarks.mp4 |
16.2 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/What It Takes to Lead America’s Vulnerability Management Team.mp4 |
62.6 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/Why Can't We All Just Get Along Bridging the Gap in Vulnerability Prioritization Standards.mp4 |
47.5 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/A Legislation Guide for Keeping pace with Cybersecurity Paradigm Shift toward Vulnerability.eng.srt |
30 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/A Roadmap for Your OSS Security Lifecyle Journey to Protect Customers.eng.srt |
96 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Adventures in Vulnerability Coordination.eng.srt |
112 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.json |
1.3 MB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.lrc |
33 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.srt |
36 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.text |
25 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.tsv |
30 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.txt |
33 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring....eng.vtt |
33 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Black and Blue, or White and Gold Minimizing Vulnerability Scoring...eng.srt |
55 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Building a Better Database How GitHub Structures Their Advisory Database to Drive Developer.eng.srt |
40 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/China's New Vuln System.eng.srt |
73 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CISA’s Known Exploited Vulnerabilities (KEV) Catalog.eng.srt |
103 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CNA Challenges From a National CERT Perspective.eng.srt |
43 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CNA Feedback Session to the CVE Program.eng.srt |
102 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Conference Closing Remarks.eng.srt |
29 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Crossing the Streams - How Downstream Can Understand Upstream Vulns.eng.srt |
108 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CSAF VEX Improved Security Data.eng.srt |
75 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CVE Is The Worst Vulnerability Framework (Except For All The Others).eng.srt |
108 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/CVSS SIG Past, Present & Future - CVSS v4.0 Beyond the Numbers.eng.srt |
116 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Daily Updates & Announcements.eng.srt |
9 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Day 1 Wrap Up & Lessons Learned.eng.srt |
31 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Day 2 Wrap Up & Lessons Learned.eng.srt |
36 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Democratizing Exploitability Data with OpenVEX.eng.srt |
85 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Effective Vulnerability Management for Over 400 Projects at the Eclipse Foundation.eng.srt |
63 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Elevating Security Standards Intel's Integration of Common Security Advisory Framework into.eng.srt |
85 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/EPSS Challenges and Opportunities Going Forward - EPSS AMA.eng.srt |
151 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Finding, Managing, Preventing Vulnerabilities An Automotive Perspective.eng.srt |
89 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Firmware Supply Chain Security BoF.eng.srt |
94 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/From SBOM to VEX - Discovering What's in the Box and How Badly it Can Hurt You.eng.srt |
88 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Information Sharing to Mitigate Emerging Vulnerabilities.eng.srt |
109 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Nestlé Unified Vulnerability Management Approach.eng.srt |
106 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Panel Discussion - The Risks of Requiring Premature Vulnerability Disclosures.eng.srt |
112 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Panel Discussion Don’t be Vexed by VEX - VEXperts Panel.eng.srt |
104 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Panel Discussion Enabling Accurate, Decentralized Root Cause Mapping at Scale.eng.srt |
97 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Panel Discussion It is a Tale as Old as Time. a CNA, the NVD, and a CVE Consumer Walk Into a.eng.srt |
83 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Panel Discussion This One Time at CVD Camp.eng.srt |
101 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Pushing Coordinated Vulnerability Disclosure forward in Asia Pacific.eng.srt |
35 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Reducing Ratio of Reserved But Public CVEs.eng.srt |
71 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Revising the CVE CNA Operational Rules AMA.eng.srt |
106 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/SBOMs - The Missing Link.eng.srt |
97 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Seeing the Vulnerable Forest Through the Exploited Trees.eng.srt |
102 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Supply Chain Security The Office of the National Cyber Director Perspective.eng.srt |
90 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/The CWE Program Current State and Road Ahead.eng.srt |
109 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/The Trials and Tribulations of Bulk Converting CVEs to OSV.eng.srt |
87 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Understanding Red Hat's SBOM - The Future of Software Transparency.eng.srt |
77 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Vulnerability Coordination in the EU.eng.srt |
99 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Welcome Remarks.eng.srt |
17 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/What It Takes to Lead America’s Vulnerability Management Team.eng.srt |
127 KB |
| FIRST/FIRST CVE VulnCon 2024 & Annual CNA Summit/FIRST CVE VulnCon 2024 & Annual CNA Summit captions/Why Can't We All Just Get Along Bridging the Gap in Vulnerability Prioritization Standards.eng.srt |
85 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/Brian LaMacchia Post-Quantum Cryptography.mp4 |
98.1 MB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/Darren Bilby A Decade of Lessons in Incident Response.mp4 |
128.5 MB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/Martijn de Hamer - 18 years old, it’s time to become mature.mp4 |
101.1 MB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Brian LaMacchia Post-Quantum Cryptography.eng.srt |
124 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.json |
3 MB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.lrc |
74 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.srt |
81 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.text |
58 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.tsv |
68 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.txt |
75 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Darren Bilby A Decade of Lessons in Incident Response.eng.vtt |
75 KB |
| FIRST/FIRSTCON 2017 - San Juan, Puerto Rico/FIRSTCON 2017 - San Juan, Puerto Rico captions/Martijn de Hamer - 18 years old, it’s time to become mature.eng.srt |
101 KB |
| FIRST/FIRSTCON 2018 - Kuala Lumpur, Malaysia/Christopher Painter - The Evolution Of The Cyber Threat.mp4 |
139.7 MB |
| FIRST/FIRSTCON 2018 - Kuala Lumpur, Malaysia/FIRSTCON 2018 - Kuala Lumpur, Malaysia captions/Christopher Painter - The Evolution Of The Cyber Threat.eng.srt |
128 KB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/Ken Munro - Backdoors in Back Doors.mp4 |
88.6 MB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/Leonie Tanczer - Who's Afraid of the Big Bad Smart Fridge.mp4 |
56.1 MB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/Merike Kaeo - Waking Up The Guards Renewed Vigilance Is Needed To Regain Trust.mp4 |
58.4 MB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/Miranda Mowbray - Things That Go Bump in the Night Detecting Problems in the Internet of Things.mp4 |
58.3 MB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/Monica Whitty - Developing a Conceptual Model for Insider Threat.mp4 |
64 MB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/FIRSTCON 2019 - Edinburgh, United Kingdom captions/Ken Munro - Backdoors in Back Doors.eng.srt |
120 KB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/FIRSTCON 2019 - Edinburgh, United Kingdom captions/Leonie Tanczer - Who's Afraid of the Big Bad Smart Fridge.eng.srt |
93 KB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/FIRSTCON 2019 - Edinburgh, United Kingdom captions/Merike Kaeo - Waking Up The Guards Renewed Vigilance Is Needed To Regain Trust.eng.srt |
99 KB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/FIRSTCON 2019 - Edinburgh, United Kingdom captions/Miranda Mowbray - Things That Go Bump in the Night Detecting Problems in the Internet of Things.eng.srt |
84 KB |
| FIRST/FIRSTCON 2019 - Edinburgh, United Kingdom/FIRSTCON 2019 - Edinburgh, United Kingdom captions/Monica Whitty - Developing a Conceptual Model for Insider Threat.eng.srt |
98 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/ADTimeline - Threathunting with Active Directory Data.mp4 |
13.5 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Applying Military Operational and Organizational Methodologies to Defend Large-Scale Enterprises.mp4 |
25.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Blueprints of Hierarchical CSIRT Structures.mp4 |
16.9 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Boom Now what.mp4 |
29.9 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Bridging the Gap on SBOM Collaborating for Software Component Transparency.mp4 |
19.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Building ML-based Threat Hunting System from Scratch.mp4 |
16.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/CERT Capacity in the Petroleum Sector of the North Sea.mp4 |
21.9 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/CiviCERT - Joining Forces to Defend Civil Society Worldwide.mp4 |
35.8 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Colouring Outside the Lines.mp4 |
26.4 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Cyber Rating Companies Field Experience.mp4 |
16.3 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Cyberespionage Targeted Attacks Abusing Third-Party Cloud Services.mp4 |
17.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Data Anomaly Driven Web Threat Hunting.mp4 |
14.4 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Day 1 Conference Opening & Keynote - Tracking Targeted Digital Threats A View from the Citizen Lab.mp4 |
41.3 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Day 2 Keynote - Project Zero's Disclosure Philosophy.mp4 |
74.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Day 3 Closing Remarks.mp4 |
14.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Day 3 Keynote - Transforming Security.mp4 |
36.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Defending the Community Through Trusted Sharing.mp4 |
16.7 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Deploying DNS over HTTPS Without Confrontation.mp4 |
17.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Design of a Flexible Model for Indicators Life-Cycle Management.mp4 |
14.4 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Doing More with Less Detecting Malicious Activity through Responsible and Privacy-Preserving AI.mp4 |
29.7 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Education and Prevention through Root Cause Analysis in Secure Software Development Lifecycle.mp4 |
26.7 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/First Step in the Quest for Manufacturing Cyber-Resilient IoT Devices.mp4 |
18.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Gear Up Regional CSIRT Community for More Robust Global Collaboration.mp4 |
18.5 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Has EDR Made Host Forensics Artifact Analysis Obsolete How to Combine them Effectively.mp4 |
17.5 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/How to Improve and Accelerate Detection Rule Development using CI CD.mp4 |
16.8 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/I2HOP Canadian Maple Syrup, French Fries and German Sausages Cyber Potluck Parties.mp4 |
27.3 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Know Your Audience Using Personas for Better PSIRT Outcomes.mp4 |
28.3 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/More About HYDSEVEN Adversary and Cryptocurrency.mp4 |
20.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/New Age - New Rules.mp4 |
41.3 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Observing your MANRS.mp4 |
25.4 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Off Label Use of DNS - Is DNS Providing Domain Name Service Only.mp4 |
22 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Passive SSH, a Fast-Lookup Database of SSH Key Materials to Support Incident Response.mp4 |
28.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Physical Consequences from Cyber Attack CISA's Hands-On Experience and Insights.mp4 |
50.7 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Pwning Password Complexity Simple, Long-Lived Passphrases in the Real World.mp4 |
21.4 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Scaling Vulnerability Coordination.mp4 |
28.5 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Scan, Analyze and Test DATA, OH MY How to Get Over the Results Rainbow.mp4 |
26.6 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Targeted Attacks in Kazakhstan An Attempt to Thieve All They Can Steal.mp4 |
23.6 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/The Craft of Cyber-Resilience Lessons from the Trenches.mp4 |
22.2 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/The Intelligent Process Lifecycle of Active Defenders.mp4 |
25.7 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/The Nightmare of Tracking Open-Source Malware Five Years of Ursnif.mp4 |
18.9 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/The Phish Pandemonium The Value of Machine Learning to Extract Insights from Phishing URLs.mp4 |
19.8 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/TIP of the Iceberg Lessons Learned from Building a Threat Intelligence Platform.mp4 |
17.1 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/What Makes a Successful Criminal Hoster.mp4 |
29.6 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/When HTTP is Not Enough A Review of Stealthy Command and Control Protocols.mp4 |
21.6 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/Where Human and System Defenders Share - Seamless CTI Sharing and Utilization.mp4 |
34.6 MB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/ADTimeline - Threathunting with Active Directory Data.eng.srt |
41 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Applying Military Operational and Organizational Methodologies to Defend Large-Scale Enterprises.eng.srt |
63 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Blueprints of Hierarchical CSIRT Structures.eng.srt |
37 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Boom Now what.eng.srt |
18 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Bridging the Gap on SBOM Collaborating for Software Component Transparency.eng.srt |
62 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Building ML-based Threat Hunting System from Scratch.eng.srt |
45 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/CERT Capacity in the Petroleum Sector of the North Sea.eng.srt |
51 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/CiviCERT - Joining Forces to Defend Civil Society Worldwide.eng.srt |
48 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Colouring Outside the Lines.eng.srt |
60 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Cyber Rating Companies Field Experience.eng.srt |
46 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Cyberespionage Targeted Attacks Abusing Third-Party Cloud Services.eng.srt |
41 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Data Anomaly Driven Web Threat Hunting.eng.srt |
42 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Day 1 Conference Opening & Keynote - Tracking Targeted Digital Threats A View from the Citizen Lab.eng.srt |
110 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Day 2 Keynote - Project Zero's Disclosure Philosophy.eng.srt |
130 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Day 3 Closing Remarks.eng.srt |
17 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Day 3 Keynote - Transforming Security.eng.srt |
104 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Defending the Community Through Trusted Sharing.eng.srt |
59 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Deploying DNS over HTTPS Without Confrontation.eng.srt |
58 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Design of a Flexible Model for Indicators Life-Cycle Management.eng.srt |
38 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Doing More with Less Detecting Malicious Activity through Responsible and Privacy-Preserving AI.eng.srt |
50 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Education and Prevention through Root Cause Analysis in Secure Software Development Lifecycle.eng.srt |
54 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/First Step in the Quest for Manufacturing Cyber-Resilient IoT Devices.eng.srt |
47 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Gear Up Regional CSIRT Community for More Robust Global Collaboration.eng.srt |
52 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Has EDR Made Host Forensics Artifact Analysis Obsolete How to Combine them Effectively.eng.srt |
55 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/How to Improve and Accelerate Detection Rule Development using CI CD.eng.srt |
53 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/I2HOP Canadian Maple Syrup, French Fries and German Sausages Cyber Potluck Parties.eng.srt |
59 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Know Your Audience Using Personas for Better PSIRT Outcomes.eng.srt |
70 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/More About HYDSEVEN Adversary and Cryptocurrency.eng.srt |
34 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/New Age - New Rules.eng.srt |
63 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Observing your MANRS.eng.srt |
57 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Off Label Use of DNS - Is DNS Providing Domain Name Service Only.eng.srt |
62 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Passive SSH, a Fast-Lookup Database of SSH Key Materials to Support Incident Response.eng.srt |
42 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Physical Consequences from Cyber Attack CISA's Hands-On Experience and Insights.eng.srt |
70 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Pwning Password Complexity Simple, Long-Lived Passphrases in the Real World.eng.srt |
66 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Scaling Vulnerability Coordination.eng.srt |
56 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Scan, Analyze and Test DATA, OH MY How to Get Over the Results Rainbow.eng.srt |
69 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Targeted Attacks in Kazakhstan An Attempt to Thieve All They Can Steal.eng.srt |
31 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/The Craft of Cyber-Resilience Lessons from the Trenches.eng.srt |
60 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/The Intelligent Process Lifecycle of Active Defenders.eng.srt |
64 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/The Nightmare of Tracking Open-Source Malware Five Years of Ursnif.eng.srt |
50 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/The Phish Pandemonium The Value of Machine Learning to Extract Insights from Phishing URLs.eng.srt |
45 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/TIP of the Iceberg Lessons Learned from Building a Threat Intelligence Platform.eng.srt |
58 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/What Makes a Successful Criminal Hoster.eng.srt |
45 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/When HTTP is Not Enough A Review of Stealthy Command and Control Protocols.eng.srt |
48 KB |
| FIRST/FIRSTCON 2020 - Virtual Edition 1/FIRSTCON 2020 - Virtual Edition 1 captions/Where Human and System Defenders Share - Seamless CTI Sharing and Utilization.eng.srt |
37 KB |
| FIRST/FIRSTCON 2021 - Capture the Flag/FIRSTCON 21 Closing Capture the Flag Session & Winning Team Presentation.mp4 |
48.2 MB |
| FIRST/FIRSTCON 2021 - Capture the Flag/FIRSTCON 21 Opening Capture the Flag Info Session.mp4 |
12 MB |
| FIRST/FIRSTCON 2021 - Capture the Flag/FIRSTCON 2021 - Capture the Flag captions/FIRSTCON 21 Closing Capture the Flag Session & Winning Team Presentation.eng.srt |
70 KB |
| FIRST/FIRSTCON 2021 - Capture the Flag/FIRSTCON 2021 - Capture the Flag captions/FIRSTCON 21 Opening Capture the Flag Info Session.eng.srt |
8 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/Adversary Emulation Generating MITRE ATT&CK Technique Sequences.mp4 |
17.8 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/Breaking Dridex Malware.mp4 |
12.4 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/COVID-19 and Cyber Security Side Effects or Business as Usual.mp4 |
29.4 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 7 - Stream 1.mp4 |
180.7 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 7 - Stream 2.mp4 |
95.2 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 7 - Stream 3.mp4 |
71.4 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 8 - Stream 1.mp4 |
171.6 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 8 - Stream 2 Part 1.mp4 |
39.2 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 8 - Stream 2 Part 2.mp4 |
39 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 8 - Stream 3 Part 1.mp4 |
37.3 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 8 - Stream 3 Part 2.mp4 |
35.4 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 9 - Stream 1.mp4 |
116.5 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 9 - Stream 2.mp4 |
91.3 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 21 - June 9 - Stream 3.mp4 |
91.2 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/IDACUT Inspecting DNS Anomalies Crossing Uncertain Times.mp4 |
27.1 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/In Depth Review of SailfishOS Forensic Artifacts.mp4 |
13.9 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/Machine Learning Security Evasion Competition 2020.mp4 |
24.8 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/Product Security Vulnerability Management Metrics are Hard.mp4 |
8 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/Security Advisories and Vulnerability Prioritization in the Wild.mp4 |
10.7 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.mp4 |
50.7 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/What a Year - Insights and Forecasts from the 2021 DBIR.mp4 |
25.5 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/Adversary Emulation Generating MITRE ATT&CK Technique Sequences.eng.srt |
50 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/Breaking Dridex Malware.eng.srt |
38 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/COVID-19 and Cyber Security Side Effects or Business as Usual.eng.srt |
54 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.json |
10 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.lrc |
290 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.srt |
261 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.text |
176 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.tsv |
238 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.txt |
294 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1.eng.vtt |
244 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.json |
10 MB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.lrc |
290 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.srt |
260 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.text |
176 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.tsv |
238 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.txt |
294 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 1_en.vtt |
244 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 2.eng.srt |
196 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 7 - Stream 3.eng.srt |
200 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 8 - Stream 1.eng.srt |
339 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 8 - Stream 2 Part 1.eng.srt |
97 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 8 - Stream 2 Part 2.eng.srt |
123 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 8 - Stream 3 Part 1.eng.srt |
77 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 8 - Stream 3 Part 2.eng.srt |
104 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 9 - Stream 1.eng.srt |
251 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 9 - Stream 2.eng.srt |
208 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/FIRSTCON 21 - June 9 - Stream 3.eng.srt |
212 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/IDACUT Inspecting DNS Anomalies Crossing Uncertain Times.eng.srt |
53 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/In Depth Review of SailfishOS Forensic Artifacts.eng.srt |
40 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/Machine Learning Security Evasion Competition 2020.eng.srt |
41 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/Product Security Vulnerability Management Metrics are Hard.eng.srt |
41 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/Security Advisories and Vulnerability Prioritization in the Wild.eng.srt |
38 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.eng.srt |
48 KB |
| FIRST/FIRSTCON 2021 - Virtual Edition 2/FIRSTCON 2021 - Virtual Edition 2 captions/What a Year - Insights and Forecasts from the 2021 DBIR.eng.srt |
71 KB |
| FIRST/FIRSTCON 2022/0-day In-the-Wild Exploitation in 2022so far.mp4 |
67.1 MB |
| FIRST/FIRSTCON 2022/A Diamond is an Analysts Best Friend Introducing the Diamond Model for Influence Operations Analysis.mp4 |
38.9 MB |
| FIRST/FIRSTCON 2022/Attack Flow - Beyond Atomic Behaviors.mp4 |
63 MB |
| FIRST/FIRSTCON 2022/Being A Better Defender By Channeling Your Worst Adversary.mp4 |
42.3 MB |
| FIRST/FIRSTCON 2022/Beyond Incident Reporting - An Analysis of Structured Representations for Incident Response.mp4 |
27.9 MB |
| FIRST/FIRSTCON 2022/Bridging Together Independent Islands - STIX Custom Objects and Matching Mechanisms to Correlate.mp4 |
38.4 MB |
| FIRST/FIRSTCON 2022/Build Automated Malware Lab with CERT.pl Open-Source Software.mp4 |
41.8 MB |
| FIRST/FIRSTCON 2022/CERT-UA Research and Technical Analysis of Large-Scale Cyber Attacks in Ukraine in 2021.mp4 |
64.1 MB |
| FIRST/FIRSTCON 2022/Community Management and Tool Orchestration the Open-Source Way via Cerebrate.mp4 |
46.1 MB |
| FIRST/FIRSTCON 2022/Creating an Information Security Information Assurance Program - Lessons Learned.mp4 |
38.9 MB |
| FIRST/FIRSTCON 2022/CSAF - the Magic Potion for Vulnerability Handling in Industrial Environments.mp4 |
47.6 MB |
| FIRST/FIRSTCON 2022/CSIRT and SOC Modernization Practices.mp4 |
35.8 MB |
| FIRST/FIRSTCON 2022/Cyber Ireland - Addressing Cyber Crime Through Industry-Academia-Government Collaboration.mp4 |
34.4 MB |
| FIRST/FIRSTCON 2022/Cybersecurity Maturity in the Pacific Islands - Integrating CERT Services in a Regional Framework.mp4 |
26.5 MB |
| FIRST/FIRSTCON 2022/Decoding the Diversity Discussion.mp4 |
51.4 MB |
| FIRST/FIRSTCON 2022/DNS as Added Security Against Ransomware Attacks.mp4 |
34.4 MB |
| FIRST/FIRSTCON 2022/Don't Blame the User Stop the Phish Before it is Even Sent.mp4 |
32.2 MB |
| FIRST/FIRSTCON 2022/EDR Internals From a Defenders Perspective.mp4 |
40.9 MB |
| FIRST/FIRSTCON 2022/Endorsing the New Rules.mp4 |
67.6 MB |
| FIRST/FIRSTCON 2022/Enhancing Operations Through the Tracking of Interactive Linux-based Intrusion Campaigns.mp4 |
51.3 MB |
| FIRST/FIRSTCON 2022/FIRST SIG Updates.mp4 |
59.5 MB |
| FIRST/FIRSTCON 2022/Follow the Dynamite Commemorating TeamTNT's Cloud Attacks.mp4 |
43.5 MB |
| FIRST/FIRSTCON 2022/Formulating An Intelligence-Driven Threat Hunting Methodology.mp4 |
45.7 MB |
| FIRST/FIRSTCON 2022/Global IR in a Fragmented World.mp4 |
65 MB |
| FIRST/FIRSTCON 2022/Going with the (work)flow Incident Response for Vicious Workflows.mp4 |
32.8 MB |
| FIRST/FIRSTCON 2022/How I Handled One of the Biggest Banking Fraud Incidents of 2020.mp4 |
57.5 MB |
| FIRST/FIRSTCON 2022/How to Secure Your Software Supply Chain and Speed-Up DFIR with Hashlookup.mp4 |
53.6 MB |
| FIRST/FIRSTCON 2022/How to Talk to a Board so the Board Will Talk Back.mp4 |
32.3 MB |
| FIRST/FIRSTCON 2022/Improving Sector Based Incident Response.mp4 |
53.2 MB |
| FIRST/FIRSTCON 2022/In Curation We Trust Generating Contextual & Actionable Threat Intelligence.mp4 |
42.5 MB |
| FIRST/FIRSTCON 2022/Incident Response Investigations in the Age of the Cloud.mp4 |
33.9 MB |
| FIRST/FIRSTCON 2022/Internet Spelunking IPv6 Scanning and Device Fingerprinting.mp4 |
58.5 MB |
| FIRST/FIRSTCON 2022/It's Just a Jump To The Left (of Boom).mp4 |
30.6 MB |
| FIRST/FIRSTCON 2022/Keynote Cybersecurity's Image Problem and What We Can All Do About It.mp4 |
103.7 MB |
| FIRST/FIRSTCON 2022/Keynote Online Child Sexual Abuse Material (CSAM) The Insider Attack You Have Not Seen Coming.mp4 |
116.2 MB |
| FIRST/FIRSTCON 2022/Keynote What Do We Owe One Another In Cybersecurity.mp4 |
102.3 MB |
| FIRST/FIRSTCON 2022/Knowledge Management - Nourishing and Enhancing Your Communication and Intelligence.mp4 |
25.4 MB |
| FIRST/FIRSTCON 2022/Living with Ransomware - The New Normal in Cyber Security.mp4 |
28.8 MB |
| FIRST/FIRSTCON 2022/More Than a CSIRT Lessons Learned from Supporting a National Response to COVID-19.mp4 |
40.4 MB |
| FIRST/FIRSTCON 2022/Never Walk Alone Inspirations From a Growing OWASP Project.mp4 |
112.3 MB |
| FIRST/FIRSTCON 2022/No More Ransomware in Critical Infrastructure.mp4 |
25.5 MB |
| FIRST/FIRSTCON 2022/Open Source Doesn't Care About You, But You Should Care About It.mp4 |
57.9 MB |
| FIRST/FIRSTCON 2022/Operation GamblingPuppet Analysis of a Multivector and Multiplatform Campaign Targeting Online.mp4 |
26.9 MB |
| FIRST/FIRSTCON 2022/Prioritizing Vulnerability Response with a Stakeholder Specific Vulnerability Categorization.mp4 |
48.6 MB |
| FIRST/FIRSTCON 2022/Ransomware Incident Response - The Real-World Story of a Ransomware Attack.mp4 |
60.5 MB |
| FIRST/FIRSTCON 2022/Ransomware Stages of Grief.mp4 |
34.4 MB |
| FIRST/FIRSTCON 2022/Ransomware, Risk, & Recovery Protecting and Creating Resilience for Hybrid Active Directory.mp4 |
45.4 MB |
| FIRST/FIRSTCON 2022/Reversing Golang Binaries with Ghidra.mp4 |
39.6 MB |
| FIRST/FIRSTCON 2022/Rise of the Vermilion Cross-platform Cobalt Strike Beacon Targeting Linux and Windows.mp4 |
41.7 MB |
| FIRST/FIRSTCON 2022/Sightings Ecosystem A Data-driven Analysis of ATT&CK in the Wild.mp4 |
60.3 MB |
| FIRST/FIRSTCON 2022/Speed is key Leveraging the Cloud for Forensic Artifact Collection & Processing.mp4 |
46.7 MB |
| FIRST/FIRSTCON 2022/The Blue Side of Documentation.mp4 |
48.6 MB |
| FIRST/FIRSTCON 2022/The SolarWinds Supply Chain Compromise.mp4 |
42 MB |
| FIRST/FIRSTCON 2022/There is No TTP.mp4 |
49.3 MB |
| FIRST/FIRSTCON 2022/Threats versus Capabilities Building Better Detect and Respond Capabilities.mp4 |
62.6 MB |
| FIRST/FIRSTCON 2022/Timing is Everything Generic Trigger Events for Malware Memory Dumping.mp4 |
40.1 MB |
| FIRST/FIRSTCON 2022/Traffic Light Protocol 2022 Updates for An Improved Sharing Experience.mp4 |
86 MB |
| FIRST/FIRSTCON 2022/VEXed by Vulnerabilities That Don't Affect Your Product Try This.mp4 |
58.6 MB |
| FIRST/FIRSTCON 2022/Watching Webpages in Action with Lookyloo.mp4 |
55.8 MB |
| FIRST/FIRSTCON 2022/Who Do You Think You Are.mp4 |
37.1 MB |
| FIRST/FIRSTCON 2022/Who Shares Wins.mp4 |
65.1 MB |
| FIRST/FIRSTCON 2022/Your Phone is Not Your Phone A Dive Into SMS PVA Fraud.mp4 |
43 MB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/0-day In-the-Wild Exploitation in 2022so far.eng.srt |
65 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/A Diamond is an Analysts Best Friend Introducing the Diamond Model for Influence Operations Analysis.eng.srt |
48 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Attack Flow - Beyond Atomic Behaviors.eng.srt |
65 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Being A Better Defender By Channeling Your Worst Adversary.eng.srt |
83 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Beyond Incident Reporting - An Analysis of Structured Representations for Incident Response.eng.srt |
46 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Bridging Together Independent Islands - STIX Custom Objects and Matching Mechanisms to Correlate.eng.srt |
44 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Build Automated Malware Lab with CERT.pl Open-Source Software.eng.srt |
62 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/CERT-UA Research and Technical Analysis of Large-Scale Cyber Attacks in Ukraine in 2021.eng.srt |
58 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Community Management and Tool Orchestration the Open-Source Way via Cerebrate.eng.srt |
68 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Creating an Information Security Information Assurance Program - Lessons Learned.eng.srt |
49 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/CSAF - the Magic Potion for Vulnerability Handling in Industrial Environments.eng.srt |
68 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/CSIRT and SOC Modernization Practices.eng.srt |
61 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Cyber Ireland - Addressing Cyber Crime Through Industry-Academia-Government Collaboration.eng.srt |
77 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Cybersecurity Maturity in the Pacific Islands - Integrating CERT Services in a Regional Framework.eng.srt |
59 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Decoding the Diversity Discussion.eng.srt |
63 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/DNS as Added Security Against Ransomware Attacks.eng.srt |
55 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Don't Blame the User Stop the Phish Before it is Even Sent.eng.srt |
49 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/EDR Internals From a Defenders Perspective.eng.srt |
70 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Endorsing the New Rules.eng.srt |
73 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Enhancing Operations Through the Tracking of Interactive Linux-based Intrusion Campaigns.eng.srt |
73 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/FIRST SIG Updates.eng.srt |
102 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Follow the Dynamite Commemorating TeamTNT's Cloud Attacks.eng.srt |
58 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Formulating An Intelligence-Driven Threat Hunting Methodology.eng.srt |
72 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Global IR in a Fragmented World.eng.srt |
55 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Going with the (work)flow Incident Response for Vicious Workflows.eng.srt |
48 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/How I Handled One of the Biggest Banking Fraud Incidents of 2020.eng.srt |
56 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/How to Secure Your Software Supply Chain and Speed-Up DFIR with Hashlookup.eng.srt |
55 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/How to Talk to a Board so the Board Will Talk Back.eng.srt |
57 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Improving Sector Based Incident Response.eng.srt |
66 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/In Curation We Trust Generating Contextual & Actionable Threat Intelligence.eng.srt |
70 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Incident Response Investigations in the Age of the Cloud.eng.srt |
56 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Internet Spelunking IPv6 Scanning and Device Fingerprinting.eng.srt |
80 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/It's Just a Jump To The Left (of Boom).eng.srt |
62 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Keynote Cybersecurity's Image Problem and What We Can All Do About It.eng.srt |
114 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Keynote Online Child Sexual Abuse Material (CSAM) The Insider Attack You Have Not Seen Coming.eng.srt |
128 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Keynote What Do We Owe One Another In Cybersecurity.eng.srt |
122 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Knowledge Management - Nourishing and Enhancing Your Communication and Intelligence.eng.srt |
64 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Living with Ransomware - The New Normal in Cyber Security.eng.srt |
62 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/More Than a CSIRT Lessons Learned from Supporting a National Response to COVID-19.eng.srt |
76 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Never Walk Alone Inspirations From a Growing OWASP Project.eng.srt |
62 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/No More Ransomware in Critical Infrastructure.eng.srt |
47 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Open Source Doesn't Care About You, But You Should Care About It.eng.srt |
72 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Operation GamblingPuppet Analysis of a Multivector and Multiplatform Campaign Targeting Online.eng.srt |
58 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Prioritizing Vulnerability Response with a Stakeholder Specific Vulnerability Categorization.eng.srt |
69 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Ransomware Incident Response - The Real-World Story of a Ransomware Attack.eng.srt |
87 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Ransomware Stages of Grief.eng.srt |
63 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Ransomware, Risk, & Recovery Protecting and Creating Resilience for Hybrid Active Directory.eng.srt |
60 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Reversing Golang Binaries with Ghidra.eng.srt |
52 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Rise of the Vermilion Cross-platform Cobalt Strike Beacon Targeting Linux and Windows.eng.srt |
68 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Sightings Ecosystem A Data-driven Analysis of ATT&CK in the Wild.eng.srt |
80 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Speed is key Leveraging the Cloud for Forensic Artifact Collection & Processing.eng.srt |
65 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/The Blue Side of Documentation.eng.srt |
49 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/The SolarWinds Supply Chain Compromise.eng.srt |
56 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/There is No TTP.eng.srt |
48 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Threats versus Capabilities Building Better Detect and Respond Capabilities.eng.srt |
75 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Timing is Everything Generic Trigger Events for Malware Memory Dumping.eng.srt |
51 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Traffic Light Protocol 2022 Updates for An Improved Sharing Experience.eng.srt |
133 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/VEXed by Vulnerabilities That Don't Affect Your Product Try This.eng.srt |
69 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Watching Webpages in Action with Lookyloo.eng.srt |
67 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Who Do You Think You Are.eng.srt |
63 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Who Shares Wins.eng.srt |
49 KB |
| FIRST/FIRSTCON 2022/FIRSTCON 2022 captions/Your Phone is Not Your Phone A Dive Into SMS PVA Fraud.eng.srt |
52 KB |
| FIRST/FIRSTCON 2023/Abusing Electron-Based Applications in Targeted Attacks.mp4 |
26.9 MB |
| FIRST/FIRSTCON 2023/An Introduction to EPSS, The Exploit Prediction Scoring System.mp4 |
30.8 MB |
| FIRST/FIRSTCON 2023/Annual General Meeting (AGM) and FIRST Update - Q&A.mp4 |
58 MB |
| FIRST/FIRSTCON 2023/AnoMark - Anomaly Detection in Command Lines with Markov Chains.mp4 |
30 MB |
| FIRST/FIRSTCON 2023/Assessing e-Government DNS Resilience.mp4 |
18.8 MB |
| FIRST/FIRSTCON 2023/Authentication Proxy Attacks Detection, Response and Hunting.mp4 |
23.2 MB |
| FIRST/FIRSTCON 2023/Automating Cloud Forensics Lab Provisioning.mp4 |
38.6 MB |
| FIRST/FIRSTCON 2023/Building a New Cybersecurity Alert Priority Matrix.mp4 |
39.1 MB |
| FIRST/FIRSTCON 2023/Busy Bees - The Transformation of BumbleBee.mp4 |
28.6 MB |
| FIRST/FIRSTCON 2023/Can We Tell the Threat Actor from Their ATT&CK TIDs.mp4 |
32.7 MB |
| FIRST/FIRSTCON 2023/Collective Defense Intelligence A Model for Empowering the Open Cybersecurity Ecosystem.mp4 |
44.7 MB |
| FIRST/FIRSTCON 2023/Compromising the Keys to the Kingdom - Exfiltrating Data to Own and Operate the Exploited Systems.mp4 |
30 MB |
| FIRST/FIRSTCON 2023/Continuous Threat Intelligence Improvements.mp4 |
19.7 MB |
| FIRST/FIRSTCON 2023/Cracking the Chaos Ransomware Family.mp4 |
33 MB |
| FIRST/FIRSTCON 2023/Creating the Coordinator Rules.mp4 |
27.1 MB |
| FIRST/FIRSTCON 2023/CTI-Powered Hunting and Response.mp4 |
31.7 MB |
| FIRST/FIRSTCON 2023/Cyber Hygiene Hunting - Security Effectiveness Validation for Valid Security Posture.mp4 |
25.7 MB |
| FIRST/FIRSTCON 2023/Dissect the Solution to Large-Scale Incident Response (and Why APTs Hate Us) - Edited Version.mp4 |
22.4 MB |
| FIRST/FIRSTCON 2023/Everyone Should Care About National Cyber Security Strategy.mp4 |
26.4 MB |
| FIRST/FIRSTCON 2023/FIRST Hall of Fame Remarks & Mid-week Updates.mp4 |
23.5 MB |
| FIRST/FIRSTCON 2023/Five Easy Ways to Spoof Contributor Package Reputation.mp4 |
35.4 MB |
| FIRST/FIRSTCON 2023/I Opened Pandora's Box and It Was Full of Obfuscation.mp4 |
27.7 MB |
| FIRST/FIRSTCON 2023/Improving CSIRTs' Procedures Through Standards.mp4 |
23.2 MB |
| FIRST/FIRSTCON 2023/Incident Command and - The Cloud - 72 Hours of IR and Ticking (1).mp4 |
29.2 MB |
| FIRST/FIRSTCON 2023/Incident Command and - The Cloud - 72 Hours of IR and Ticking.mp4 |
31.5 MB |
| FIRST/FIRSTCON 2023/Info-Stealer Most Bang for the Buck Malware in 2022.mp4 |
17.1 MB |
| FIRST/FIRSTCON 2023/Intel as Code - Building a Threat Informed Security Organization.mp4 |
23.4 MB |
| FIRST/FIRSTCON 2023/IOC-DREAM - IOC Distribution in Restricted Environment and Automating response based on MISP.mp4 |
28.6 MB |
| FIRST/FIRSTCON 2023/ISO 27035 Practical Value for CSIRTs and SOCs.mp4 |
36.7 MB |
| FIRST/FIRSTCON 2023/Keynote Cybercrime and Law Enforcement Evolutions and Improving Integration Within ().mp4 |
33.9 MB |
| FIRST/FIRSTCON 2023/Keynote How Did We Get Here.mp4 |
36.4 MB |
| FIRST/FIRSTCON 2023/Keynote Why Gender Diversity is Better Security.mp4 |
59.1 MB |
| FIRST/FIRSTCON 2023/Knocking Out Post-Exploitation Kits.mp4 |
33.3 MB |
| FIRST/FIRSTCON 2023/Lightning Talks I.mp4 |
65.3 MB |
| FIRST/FIRSTCON 2023/Lightning Talks II.mp4 |
49.5 MB |
| FIRST/FIRSTCON 2023/Mistakes Happen, Either Learn From Them Or Rinse And Repeat.mp4 |
38.9 MB |
| FIRST/FIRSTCON 2023/MyJVN Product Dictionary Challenge for Collaboration with Vulnerability Database and ().mp4 |
30.1 MB |
| FIRST/FIRSTCON 2023/N-IOC's to Rule Them All.mp4 |
32.9 MB |
| FIRST/FIRSTCON 2023/No One Likes to be Excluded What Is the Role of War Exclusions in Cyber Insurance.mp4 |
53.1 MB |
| FIRST/FIRSTCON 2023/Objectifying Your Incident Management to Lift the Fog of IR.mp4 |
19 MB |
| FIRST/FIRSTCON 2023/Opening Remarks and Welcome Address.mp4 |
31.6 MB |
| FIRST/FIRSTCON 2023/Operationalization of Malawi CERT- Lessons Learnt and Challenges.mp4 |
35.9 MB |
| FIRST/FIRSTCON 2023/Pain and Suffering - Implementing CTI Successfully in a SOC.mp4 |
25.5 MB |
| FIRST/FIRSTCON 2023/Preserving Confidentiality When Hunting With Friends.mp4 |
32 MB |
| FIRST/FIRSTCON 2023/Ransomware Zugzwang.mp4 |
37.1 MB |
| FIRST/FIRSTCON 2023/Safeguarding IoT Devices in Digital Age - Building IoT Test Lab.mp4 |
36.3 MB |
| FIRST/FIRSTCON 2023/SIG Updates Multi-Stakeholder Ransomware, CVSS, Cyber Insurance, DNS Abuse, EPSS.mp4 |
28 MB |
| FIRST/FIRSTCON 2023/SIG Updates SecLounge, Automation, NETSEC, CSIRT, CSIRT Metrics, Vulnerability Coordination ().mp4 |
55.3 MB |
| FIRST/FIRSTCON 2023/SIG Updates TLP, Malware Analysis, CTI, WoF, Red Team, Ethics.mp4 |
17 MB |
| FIRST/FIRSTCON 2023/Sliding Down the Slippery Analogy Slope and Landing in Clarity.mp4 |
34.7 MB |
| FIRST/FIRSTCON 2023/SOCCRATES Automated Security Decision Support for SOCs and CSIRTs.mp4 |
38.7 MB |
| FIRST/FIRSTCON 2023/The 4 Pillars of Cyber Security.mp4 |
31.1 MB |
| FIRST/FIRSTCON 2023/The Female Conversation Empowering Female Talent in Incident Response.mp4 |
81.2 MB |
| FIRST/FIRSTCON 2023/The Internet DDoS Threat Landscape.mp4 |
31.8 MB |
| FIRST/FIRSTCON 2023/The PowerPuff Girls of Information Sharing - Joining Forces To Protect The Universe.mp4 |
93.2 MB |
| FIRST/FIRSTCON 2023/Three Simple and Effective Cybersecurity Exercises.mp4 |
48.9 MB |
| FIRST/FIRSTCON 2023/Till There Was Unix Defending ESXi Against Ransomware Attacks.mp4 |
39.2 MB |
| FIRST/FIRSTCON 2023/Typosquatting Finder - An Open Source Solution to Find Typosquatted Domains.mp4 |
28.2 MB |
| FIRST/FIRSTCON 2023/UMQ What Comes After TLP.mp4 |
25.2 MB |
| FIRST/FIRSTCON 2023/Universal (Software) Product Identity Solving a Hard Problem Twice Over.mp4 |
114.2 MB |
| FIRST/FIRSTCON 2023/Using Apple Sysdiagnose for Forensics and Integrity Check.mp4 |
38.9 MB |
| FIRST/FIRSTCON 2023/What's Running on My Hosts Process Identification Through Network Traffic Monitoring.mp4 |
32.2 MB |
| FIRST/FIRSTCON 2023/You Are a Manager Harry.mp4 |
29.7 MB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Abusing Electron-Based Applications in Targeted Attacks.eng.srt |
44 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/An Introduction to EPSS, The Exploit Prediction Scoring System.eng.srt |
66 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Annual General Meeting (AGM) and FIRST Update - Q&A.eng.srt |
70 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/AnoMark - Anomaly Detection in Command Lines with Markov Chains.eng.srt |
49 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Assessing e-Government DNS Resilience.eng.srt |
30 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Authentication Proxy Attacks Detection, Response and Hunting.eng.srt |
50 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Automating Cloud Forensics Lab Provisioning.eng.srt |
49 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Building a New Cybersecurity Alert Priority Matrix.eng.srt |
69 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Busy Bees - The Transformation of BumbleBee.eng.srt |
56 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Can We Tell the Threat Actor from Their ATT&CK TIDs.eng.srt |
44 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Collective Defense Intelligence A Model for Empowering the Open Cybersecurity Ecosystem.eng.srt |
64 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Compromising the Keys to the Kingdom - Exfiltrating Data to Own and Operate the Exploited Systems.eng.srt |
69 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Continuous Threat Intelligence Improvements.eng.srt |
36 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Cracking the Chaos Ransomware Family.eng.srt |
47 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Creating the Coordinator Rules.eng.srt |
48 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/CTI-Powered Hunting and Response.eng.srt |
57 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Cyber Hygiene Hunting - Security Effectiveness Validation for Valid Security Posture.eng.srt |
47 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Dissect the Solution to Large-Scale Incident Response (and Why APTs Hate Us) - Edited Version.eng.srt |
42 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Everyone Should Care About National Cyber Security Strategy.eng.srt |
40 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/FIRST Hall of Fame Remarks & Mid-week Updates.eng.srt |
42 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Five Easy Ways to Spoof Contributor Package Reputation.eng.srt |
56 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/I Opened Pandora's Box and It Was Full of Obfuscation.eng.srt |
53 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Improving CSIRTs' Procedures Through Standards.eng.srt |
49 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Incident Command and - The Cloud - 72 Hours of IR and Ticking (1).eng.srt |
69 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Incident Command and - The Cloud - 72 Hours of IR and Ticking.eng.srt |
71 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Info-Stealer Most Bang for the Buck Malware in 2022.eng.srt |
38 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Intel as Code - Building a Threat Informed Security Organization.eng.srt |
72 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/IOC-DREAM - IOC Distribution in Restricted Environment and Automating response based on MISP.eng.srt |
39 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/ISO 27035 Practical Value for CSIRTs and SOCs.eng.srt |
48 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Keynote Cybercrime and Law Enforcement Evolutions and Improving Integration Within ().eng.srt |
69 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Keynote How Did We Get Here.eng.srt |
99 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Keynote Why Gender Diversity is Better Security.eng.srt |
118 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Knocking Out Post-Exploitation Kits.eng.srt |
65 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Lightning Talks I.eng.srt |
87 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Lightning Talks II.eng.srt |
61 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Mistakes Happen, Either Learn From Them Or Rinse And Repeat.eng.srt |
58 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/MyJVN Product Dictionary Challenge for Collaboration with Vulnerability Database and ().eng.srt |
43 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/N-IOC's to Rule Them All.eng.srt |
51 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/No One Likes to be Excluded What Is the Role of War Exclusions in Cyber Insurance.eng.srt |
137 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Objectifying Your Incident Management to Lift the Fog of IR.eng.srt |
59 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Opening Remarks and Welcome Address.eng.srt |
55 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Operationalization of Malawi CERT- Lessons Learnt and Challenges.eng.srt |
53 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Pain and Suffering - Implementing CTI Successfully in a SOC.eng.srt |
42 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Preserving Confidentiality When Hunting With Friends.eng.srt |
56 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Ransomware Zugzwang.eng.srt |
75 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Safeguarding IoT Devices in Digital Age - Building IoT Test Lab.eng.srt |
55 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/SIG Updates Multi-Stakeholder Ransomware, CVSS, Cyber Insurance, DNS Abuse, EPSS.eng.srt |
47 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/SIG Updates SecLounge, Automation, NETSEC, CSIRT, CSIRT Metrics, Vulnerability Coordination ().eng.srt |
59 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/SIG Updates TLP, Malware Analysis, CTI, WoF, Red Team, Ethics.eng.srt |
41 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Sliding Down the Slippery Analogy Slope and Landing in Clarity.eng.srt |
54 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/SOCCRATES Automated Security Decision Support for SOCs and CSIRTs.eng.srt |
60 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/The 4 Pillars of Cyber Security.eng.srt |
46 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/The Female Conversation Empowering Female Talent in Incident Response.eng.srt |
150 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/The Internet DDoS Threat Landscape.eng.srt |
66 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/The PowerPuff Girls of Information Sharing - Joining Forces To Protect The Universe.eng.srt |
157 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Three Simple and Effective Cybersecurity Exercises.eng.srt |
69 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Till There Was Unix Defending ESXi Against Ransomware Attacks.eng.srt |
66 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Typosquatting Finder - An Open Source Solution to Find Typosquatted Domains.eng.srt |
4 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/UMQ What Comes After TLP.eng.srt |
40 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Universal (Software) Product Identity Solving a Hard Problem Twice Over.eng.srt |
133 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/Using Apple Sysdiagnose for Forensics and Integrity Check.eng.srt |
53 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/What's Running on My Hosts Process Identification Through Network Traffic Monitoring.eng.srt |
45 KB |
| FIRST/FIRSTCON 2023/FIRSTCON 2023 captions/You Are a Manager Harry.eng.srt |
57 KB |
| FIRST/FIRSTCON 2024/14 Questions Are All You Need.mp4 |
45.6 MB |
| FIRST/FIRSTCON 2024/A Deep Dive into KEV.mp4 |
35 MB |
| FIRST/FIRSTCON 2024/A Recipe for Improving SecOps Detections.mp4 |
37.2 MB |
| FIRST/FIRSTCON 2024/AI Governance with Multistakeholder for Safer AI Society.mp4 |
31.2 MB |
| FIRST/FIRSTCON 2024/Are You Lazarus - Cryptocurrency Hackers Targeting Japanese Organizations.mp4 |
29.5 MB |
| FIRST/FIRSTCON 2024/Attack Path Based Detection Engineering - Leveraging BloodHound for Robust Defense.mp4 |
37.2 MB |
| FIRST/FIRSTCON 2024/Breaking the Holy Trinity of Open-Source Ecosystem - Malicious Code in Open-Source Packages.mp4 |
43.5 MB |
| FIRST/FIRSTCON 2024/Building a National CSIRT on a Nano Scale.mp4 |
43.2 MB |
| FIRST/FIRSTCON 2024/Building up a PSIRT Team for an Open Source Project Lessons Learned from Zephyr.mp4 |
33.5 MB |
| FIRST/FIRSTCON 2024/Cloud Console Cartographer Tapping Into Mapping - Slogging Thru Logging.mp4 |
46.6 MB |
| FIRST/FIRSTCON 2024/Collaboratively Caring and Securely Sharing of Information that Matters.mp4 |
28.2 MB |
| FIRST/FIRSTCON 2024/Cybersecurity Performance Goals for Critical Infrastructure A Primer and A Progress Report.mp4 |
39.5 MB |
| FIRST/FIRSTCON 2024/Defending Forward How National Organizations Can Identify Adversary Infrastructure and Attacks.mp4 |
29.6 MB |
| FIRST/FIRSTCON 2024/Demystifying Cloud Infrastructure Attacks.mp4 |
32.3 MB |
| FIRST/FIRSTCON 2024/Demystifying Cloud Infrastructure Attacks-tagged.eng.json |
1.4 MB |
| FIRST/FIRSTCON 2024/Demystifying Cloud Infrastructure Attacks-tagged.eng.lrc |
34 KB |
| FIRST/FIRSTCON 2024/Developing a New Cyber Security Brand for Consumers and Small Businesses.mp4 |
24.2 MB |
| FIRST/FIRSTCON 2024/Dissecting the Arsenal of LockBit.mp4 |
25 MB |
| FIRST/FIRSTCON 2024/Dissecting Tradecraft Building Robust Detections Through Tradecraft Decomposition.mp4 |
39.4 MB |
| FIRST/FIRSTCON 2024/Empowering Cybersecurity Outreach And Learning Through Collaborative Challenge Building, Sharing.mp4 |
66.4 MB |
| FIRST/FIRSTCON 2024/Enhancing Leadership Readiness for Cyber Incidents A Strategic Pre-Briefing Approach.mp4 |
25.6 MB |
| FIRST/FIRSTCON 2024/Experiences of BtCIRT Making Impact for Bhutan Cyber Resilience Challenges and Successes.mp4 |
34.7 MB |
| FIRST/FIRSTCON 2024/From Code to Crime Exploring Threats in GitHub Codespaces.mp4 |
34.2 MB |
| FIRST/FIRSTCON 2024/From Laboratory to Grid Advancing IACS Incident Response and Cyber Resilience.mp4 |
41.7 MB |
| FIRST/FIRSTCON 2024/Gearing Towards the Next Level in Playbook-Driven Security Automation - Leveraging CACAO V2.mp4 |
37 MB |
| FIRST/FIRSTCON 2024/Help My CISO is Visibly Bored When I Present IR Metrics.mp4 |
39 MB |
| FIRST/FIRSTCON 2024/How AI is Changing the Way We Analyze Malware.mp4 |
35 MB |
| FIRST/FIRSTCON 2024/Improving ICS OT Threat Hunt & Incident Response Capabilities Through Adversary Emulation.mp4 |
30.2 MB |
| FIRST/FIRSTCON 2024/IntelOwl Making the Life of Security Analysts Easier.mp4 |
33.3 MB |
| FIRST/FIRSTCON 2024/JTAN - Building a Data Sharing Network Using Open Source Tools.mp4 |
35.9 MB |
| FIRST/FIRSTCON 2024/Lessons Learned from a Countrywide Scanning Program.mp4 |
38.6 MB |
| FIRST/FIRSTCON 2024/Lightning Talks I.mp4 |
59.9 MB |
| FIRST/FIRSTCON 2024/Lightning Talks II.mp4 |
69.5 MB |
| FIRST/FIRSTCON 2024/Metamorphosis in Vulnerability Analysis Navigating VeX Challenges and Soaring Towards Solutions.mp4 |
28.6 MB |
| FIRST/FIRSTCON 2024/Monday Keynote Address Challenges of Digital Agency.mp4 |
60.2 MB |
| FIRST/FIRSTCON 2024/One Chain to Shackle Them All.mp4 |
45.1 MB |
| FIRST/FIRSTCON 2024/Organizing Security Issues Discovered During Product Testing for Easier Consumption by Product.mp4 |
24.6 MB |
| FIRST/FIRSTCON 2024/Pushing Coordinated Vulnerability Disclosure Forward in Asia Pacific.mp4 |
28.2 MB |
| FIRST/FIRSTCON 2024/SBOMs for the Win How PSIRT Teams Could Use SBOM.mp4 |
37.3 MB |
| FIRST/FIRSTCON 2024/Sharing Communities The Good, the Bad, and the Ugly.mp4 |
27.1 MB |
| FIRST/FIRSTCON 2024/SIG Updates.mp4 |
49.8 MB |
| FIRST/FIRSTCON 2024/Sigma Unleashed A Realistic Implementation.mp4 |
25.3 MB |
| FIRST/FIRSTCON 2024/So Far and Yet so Close. A Story of Collaboration Between Japan and Spain While Analyzing.mp4 |
34.2 MB |
| FIRST/FIRSTCON 2024/Tales From a Cloud CSIRT- Let’s Deep Dive into a Kubernetes (k8s) Infection.mp4 |
32.3 MB |
| FIRST/FIRSTCON 2024/Tearing Down the Silos - Cyber Defense Needs an Integrated Approach.mp4 |
39.6 MB |
| FIRST/FIRSTCON 2024/Turn the Tables How We Use GPT to Detect Phishing Websites.mp4 |
22.3 MB |
| FIRST/FIRSTCON 2024/Unveiling Active Directory Secrets Uncommon Tricks for Enhanced Security.mp4 |
26.1 MB |
| FIRST/FIRSTCON 2024/Version Fingerprinting Tricks Automating Software Identification for Vulnerability Scanners.mp4 |
35.3 MB |
| FIRST/FIRSTCON 2024/Vulnerability Response for Heterogenous OT Products - Principles to Build Your Own Framework.mp4 |
33.5 MB |
| FIRST/FIRSTCON 2024/Wednesday Keynote Address Incident Command System 4 Industrial Control Systems (ICS4ICS).mp4 |
60.8 MB |
| FIRST/FIRSTCON 2024/Zero Trust and Jurassic Park.mp4 |
21.2 MB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/14 Questions Are All You Need.eng.srt |
58 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/A Deep Dive into KEV.eng.srt |
70 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/A Recipe for Improving SecOps Detections.eng.srt |
81 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/AI Governance with Multistakeholder for Safer AI Society.eng.srt |
37 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Are You Lazarus - Cryptocurrency Hackers Targeting Japanese Organizations.eng.srt |
45 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Attack Path Based Detection Engineering - Leveraging BloodHound for Robust Defense.eng.srt |
62 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Breaking the Holy Trinity of Open-Source Ecosystem - Malicious Code in Open-Source Packages.eng.srt |
52 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Building a National CSIRT on a Nano Scale.eng.srt |
49 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Building up a PSIRT Team for an Open Source Project Lessons Learned from Zephyr.eng.srt |
66 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Cloud Console Cartographer Tapping Into Mapping - Slogging Thru Logging.eng.srt |
65 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Collaboratively Caring and Securely Sharing of Information that Matters.eng.srt |
48 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Cybersecurity Performance Goals for Critical Infrastructure A Primer and A Progress Report.eng.srt |
58 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Defending Forward How National Organizations Can Identify Adversary Infrastructure and Attacks.eng.srt |
51 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks.eng.srt |
53 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks-tagged.eng.srt |
38 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks-tagged.eng.text |
26 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks-tagged.eng.tsv |
31 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks-tagged.eng.txt |
34 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Demystifying Cloud Infrastructure Attacks-tagged.eng.vtt |
35 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Developing a New Cyber Security Brand for Consumers and Small Businesses.eng.srt |
62 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Dissecting the Arsenal of LockBit.eng.srt |
38 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Dissecting Tradecraft Building Robust Detections Through Tradecraft Decomposition.eng.srt |
63 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Empowering Cybersecurity Outreach And Learning Through Collaborative Challenge Building, Sharing.eng.srt |
64 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Enhancing Leadership Readiness for Cyber Incidents A Strategic Pre-Briefing Approach.eng.srt |
58 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Experiences of BtCIRT Making Impact for Bhutan Cyber Resilience Challenges and Successes.eng.srt |
54 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/From Code to Crime Exploring Threats in GitHub Codespaces.eng.srt |
59 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/From Laboratory to Grid Advancing IACS Incident Response and Cyber Resilience.eng.srt |
53 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Gearing Towards the Next Level in Playbook-Driven Security Automation - Leveraging CACAO V2.eng.srt |
55 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Help My CISO is Visibly Bored When I Present IR Metrics.eng.srt |
61 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/How AI is Changing the Way We Analyze Malware.eng.srt |
46 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Improving ICS OT Threat Hunt & Incident Response Capabilities Through Adversary Emulation.eng.srt |
60 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/IntelOwl Making the Life of Security Analysts Easier.eng.srt |
53 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/JTAN - Building a Data Sharing Network Using Open Source Tools.eng.srt |
55 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Lessons Learned from a Countrywide Scanning Program.eng.srt |
60 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Lightning Talks I.eng.srt |
83 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Lightning Talks II.eng.srt |
108 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Metamorphosis in Vulnerability Analysis Navigating VeX Challenges and Soaring Towards Solutions.eng.srt |
63 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Monday Keynote Address Challenges of Digital Agency.eng.srt |
66 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/One Chain to Shackle Them All.eng.srt |
51 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Organizing Security Issues Discovered During Product Testing for Easier Consumption by Product.eng.srt |
40 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Pushing Coordinated Vulnerability Disclosure Forward in Asia Pacific.eng.srt |
47 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/SBOMs for the Win How PSIRT Teams Could Use SBOM.eng.srt |
47 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Sharing Communities The Good, the Bad, and the Ugly.eng.srt |
50 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/SIG Updates.eng.srt |
92 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Sigma Unleashed A Realistic Implementation.eng.srt |
38 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/So Far and Yet so Close. A Story of Collaboration Between Japan and Spain While Analyzing.eng.srt |
49 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Tales From a Cloud CSIRT- Let’s Deep Dive into a Kubernetes (k8s) Infection.eng.srt |
49 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Tearing Down the Silos - Cyber Defense Needs an Integrated Approach.eng.srt |
56 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Turn the Tables How We Use GPT to Detect Phishing Websites.eng.srt |
44 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Unveiling Active Directory Secrets Uncommon Tricks for Enhanced Security.eng.srt |
40 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Version Fingerprinting Tricks Automating Software Identification for Vulnerability Scanners.eng.srt |
55 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Vulnerability Response for Heterogenous OT Products - Principles to Build Your Own Framework.eng.srt |
60 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Wednesday Keynote Address Incident Command System 4 Industrial Control Systems (ICS4ICS).eng.srt |
107 KB |
| FIRST/FIRSTCON 2024/FIRSTCON 2024 captions/Zero Trust and Jurassic Park.eng.srt |
35 KB |